Sciweavers

1098 search results - page 45 / 220
» Proactive Intrusion Detection
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
CF
2008
ACM
14 years 11 months ago
Exact multi-pattern string matching on the cell/b.e. processor
String searching is the computationally intensive kernel of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filter...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
15 years 3 months ago
Information Driven Coordinated Air-Ground Proactive Sensing
— This paper concerns the problem of actively searching for and localizing ground features by a coordinated team of air and ground robotic sensor platforms. The approach taken bu...
Ben Grocholsky, Rahul Swaminathan, James F. Keller...
TITB
2010
120views Education» more  TITB 2010»
14 years 4 months ago
A distributed, collaborative intelligent agent system approach for proactive postmarketing drug safety surveillance
Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance prim...
Yanqing Ji, Hao Ying, Margo S. Farber, John Yen, P...
DSN
2005
IEEE
15 years 3 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...